{"id":5573,"date":"2021-02-14T17:41:45","date_gmt":"2021-02-14T16:41:45","guid":{"rendered":"https:\/\/kinit.sk\/member\/peter-pistek\/"},"modified":"2025-10-15T17:14:56","modified_gmt":"2025-10-15T15:14:56","slug":"peter-pistek","status":"publish","type":"member","link":"https:\/\/kinit.sk\/sk\/clen\/peter-pistek\/","title":{"rendered":"Peter Pi\u0161tek"},"content":{"rendered":"<div id=\"\" class=\"element core-paragraph\">\n<p>Peter focuses on information security, in particular forensics analysis, phishing, biometrics, network anomaly detection, and process security. He is now focusing on anomaly detection using machine learning models. Beside the research scope on information security he also tries to keep track of current impacts of hacks, vulnerabilities, malicious behavior on society. He holds <a href=\"https:\/\/www.credly.com\/badges\/222dee0e-78c6-4cb7-ad1f-1abd151c27a0\/public_url\" target=\"_blank\" rel=\"noreferrer noopener\">CISA<\/a> and <a href=\"https:\/\/www.credly.com\/badges\/adc2e8d3-adcd-40f4-af08-e07b13ebd58e\/public_url\" target=\"_blank\" rel=\"noreferrer noopener\">CISM<\/a> certifications from <a href=\"https:\/\/www.isaca.org\" target=\"_blank\" rel=\"noreferrer noopener\">ISACA <\/a>and <a href=\"https:\/\/cybercompetence.sk\/wp-content\/uploads\/dokumenty\/ine\/KCCKB-CO-Zoznam_manazerovKB.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity manager<\/a> and <a href=\"https:\/\/cybercompetence.sk\/wp-content\/uploads\/dokumenty\/ine\/zoznam-auditorov.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity auditor<\/a> from <a href=\"https:\/\/cybercompetence.sk\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Security Competence and Certification Center<\/a>.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>He is a former vice-dean for Bachelor\u2019s study and propagation at the Faculty of Informatics and Information Technologies at the Slovak University of Technology, where he was also interested in learning analytics and education data science in research.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>He has supervised more than 50 Bachelor\u2019s and Master\u2019s students. He has participated as a lecturer or assistant in more than ten different courses focused on hardware design or information security and he established a joint research lab with industry focused on smart cities.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-heading\">\n<h2 class=\"wp-block-heading\" id=\"selected-activities\">Selected activities<\/h2>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>Peter believes in popularization of information security or information technology in general among the population and in particular among young people.&nbsp;<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>From the recent history he serves as:<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-list\">\n<ul class=\"wp-block-list\"><div id=\"\" class=\"element core-list-item\">\n<li>Committee member and mentor<div id=\"\" class=\"element core-list\">\n<ul class=\"wp-block-list\"><div id=\"\" class=\"element core-list-item\">\n<li><a href=\"https:\/\/www.juniorinternet.sk\/cms\/\" target=\"_blank\" rel=\"noreferrer noopener\">Junior Internet<\/a> &#8211; competition for students organized by <a href=\"https:\/\/amavet.sk\" target=\"_blank\" rel=\"noreferrer noopener\">Amavet<\/a><\/li>\n<\/div><\/ul>\n<\/div><\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Invited speaker<div id=\"\" class=\"element core-list\">\n<ul class=\"wp-block-list\"><div id=\"\" class=\"element core-list-item\">\n<li>NerdyNite (\u201cVe\u010der zVEDAv\u00fdch\u201d)<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>European Conference on Educational Robotics &#8211; <a href=\"https:\/\/vedanadosah.cvtisr.sk\/technika\/informacne-a-komunikacne-technologie\/na-konferencii-ecer-2022-vystupia-experti-na-strojove-ucenie\/\" target=\"_blank\" rel=\"noreferrer noopener\">ECER 2022<\/a> &#8211; international scientific conference and competition for students<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>International Security Summit 2023 (<a href=\"https:\/\/is2.cz\/en\/articles\/speakers-2023\/peter-pistek-en\" target=\"_blank\" rel=\"noreferrer noopener\">IS2<\/a>)<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li><a href=\"https:\/\/www.itapa.sk\/speakers\/peter-pistek\/\" target=\"_blank\" rel=\"noreferrer noopener\">Spring ITAPA 2023<\/a> &#8211; the biggest IT conference in Slovakia. Connecting IT, industry and eGoverment.<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li><a href=\"https:\/\/efocus.eu\/cyber-security23\/\">Cyber security in changing conditions<\/a> 2023 (eFocus)<\/li>\n<\/div><\/ul>\n<\/div><\/li>\n<\/div><\/ul>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>He prepares <a href=\"https:\/\/kinit.sk\/sk\/research\/security-news\/\">short news<\/a> from the information security domain each month here in KInIT for the general audience and commented version regularly published on <a href=\"https:\/\/www.linkedin.com\/in\/peterpistek\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn<\/a>. He is a co-author of a book for students and general audience \u201c<a href=\"https:\/\/dspace.uniba.sk\/handle\/123456789\/20\" target=\"_blank\" rel=\"noreferrer noopener\">Fundamentals of cyber and information security<\/a>\u201d (in Slovak).<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-heading\">\n<h2 class=\"wp-block-heading\" id=\"professional-service\">Professional Service<\/h2>\n<\/div>\n\n<div id=\"\" class=\"element core-list\">\n<ul class=\"wp-block-list\"><div id=\"\" class=\"element core-list-item\">\n<li>Member of<div id=\"\" class=\"element core-list\">\n<ul class=\"wp-block-list\"><div id=\"\" class=\"element core-list-item\">\n<li>ISACA<\/li>\n<\/div><\/ul>\n<\/div><\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Conferences<div id=\"\" class=\"element core-list\">\n<ul class=\"wp-block-list\"><div id=\"\" class=\"element core-list-item\">\n<li>International Security Summit (<a href=\"https:\/\/is2.cz\" target=\"_blank\" rel=\"noreferrer noopener\">IS2<\/a>) &#8211; member of Advisory board, Ambassador for Slovak republic<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li><a href=\"https:\/\/mobilityiot.eai-conferences.org\" target=\"_blank\" rel=\"noreferrer noopener\">Mobility IoT<\/a> &#8211; Technical program committee member<\/li>\n<\/div><\/ul>\n<\/div><\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Journals<div id=\"\" class=\"element core-list\">\n<ul class=\"wp-block-list\"><div id=\"\" class=\"element core-list-item\">\n<li>Data Security Management (<a href=\"https:\/\/dsm.tate.cz\/cs\/\" target=\"_blank\" rel=\"noreferrer noopener\">DSM<\/a>) &#8211; member of Advisory board<\/li>\n<\/div><\/ul>\n<\/div><\/li>\n<\/div><\/ul>\n<\/div>\n\n<div id=\"projects\" class=\"element acf-loop\"><section id=\"projects\" class=\"loop old \" style=\"background-color: #ebf7f9;\" >\n\t<div class=\"wrapper-out\">\n\t\t<div class=\"wrapper-in\">\n\t\t\t<div class=\"in cf\">\n\t\t\t\t<div class=\"element-inner\">\n\t\t\t\t\t<div class=\"headline\"><h2>Selected Projects<\/h2><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"loop-wrap loop-Project loop-style1 loop-load_more loop-6 cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-26298\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/projekt\/evolveum-use-of-ai-methods-in-identity-and-access-management\/\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"320\" height=\"200\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2023\/04\/202304_web_project_Evolveum_feature_image-scaled-320x200.png\" class=\"attachment-thumbnail size-thumbnail wp-post-image lazyload\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 320px; --smush-placeholder-aspect-ratio: 320\/200;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Evolveum: Use of AI methods in Identity and Access Management<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tapr 20. 2023\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">Identity and access management (IAM) deals with managing identities in cyberspace. IAM has difficulties scaling for large organizations given a huge number of users and their roles there. In this&#8230;<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-22302\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/projekt\/vnet-improving-network-cybersecurity-with-hybrid-approaches\/\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"320\" height=\"200\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2022\/07\/202206_web_project_vnet_WEB-320x200.jpg\" class=\"attachment-thumbnail size-thumbnail wp-post-image lazyload\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 320px; --smush-placeholder-aspect-ratio: 320\/200;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>VNET: Improving network cybersecurity with hybrid approaches<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tj\u00fal 11. 2022\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">Network communication is under constant monitoring to detect any unexpected behavior (anomalies). This project focuses on anomaly detection, especially on the harmful anomalies caused by cybercriminals. VNET as a provider&#8230;<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-22236\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/projekt\/ai4europe-the-unified-platform-for-boosting-european-ai-academic-and-industrial-research\/\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"320\" height=\"200\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2022\/07\/202207_web_project_AI4EUROPE_WEB-320x200.jpg\" class=\"attachment-thumbnail size-thumbnail wp-post-image lazyload\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 320px; --smush-placeholder-aspect-ratio: 320\/200;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>AI4Europe: The unified platform for boosting European AI academic and industrial research<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tj\u00fal 21. 2022\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">KInIT joins forces with 23 prominent European institutions to build a better artificial intelligence platform supporting daily needs of academic and industrial AI researchers. In this project, we primarily focus&#8230;<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-21013\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/projekt\/hopero-ai-european-digital-innovation-hub\/\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"320\" height=\"200\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2022\/09\/202210_web_project_EDIH-320x200.png\" class=\"attachment-thumbnail size-thumbnail wp-post-image lazyload\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 320px; --smush-placeholder-aspect-ratio: 320\/200;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Hopero.AI: European Digital Innovation Hub<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tsep 26. 2022\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">The Slovak AI European Digital Innovation Hub is a nation-wide ecosystem with a clear focus on artificial intelligence aiming to support the digital transformation of Slovak companies in the European&#8230;<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-22363\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/projekt\/vnet-anomaly-detection-for-improving-network-cybersecurity\/\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"320\" height=\"200\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2024\/02\/202401_web_project_innovatrics_feature_vnet-320x200.png\" class=\"attachment-thumbnail size-thumbnail wp-post-image lazyload\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 320px; --smush-placeholder-aspect-ratio: 320\/200;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>VNET: Anomaly detection for improving network cybersecurity<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdec 7. 2021\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">People and companies use computers for extended communication, part of which can be highly sensitive and may also be stored in computers or on servers. This may be interesting for&#8230;<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<\/div>\n\n<div id=\"\" class=\"element acf-loop\"><section class=\"loop old \"  >\n\t<div class=\"wrapper-out\">\n\t\t<div class=\"wrapper-in\">\n\t\t\t<div class=\"in cf\">\n\t\t\t\t<div class=\"element-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"loop-wrap loop-Project loop-style2 loop-load_more loop-6 cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-7815\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Interactive Manufacturing @ Schools<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tfeb 25. 2021\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">Regional Innovation Scheme, EIT Manufacturing, 2020-2020<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-7822\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Methods for the Design and Verification of Digital Systems with Low Power Consumption Using Formal Specification Languages<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tfeb 24. 2021\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">VEGA 1\/0616\/14. 2014-2016<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-7821\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Manufacturable and Dependable Multicore Architectures at Nanoscale<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tfeb 24. 2021\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">COST Action IC 1103. 2014-2015<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-7818\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Design Optimization of Low-Power Digital and Mixed Integrated Systems<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tfeb 24. 2021\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">VEGA 1\/1008\/12. 2012-2015<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-7792\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Security and Reliability in Distributed Computer Systems and Mobile Computer Networks<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tfeb 24. 2021\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">VEGA 1\/0649\/09. 2009-2011<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<\/div>\n\n<div id=\"featured-publications\" class=\"element acf-loop background-columns-blue\"><section id=\"featured-publications\" class=\"loop old  background-columns-blue\"  >\n\t<div class=\"wrapper-out\">\n\t\t<div class=\"wrapper-in\">\n\t\t\t<div class=\"in cf\">\n\t\t\t\t<div class=\"element-inner\">\n\t\t\t\t\t<div class=\"headline\"><h2>Selected Publications<\/h2><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"loop-wrap loop-Publication loop-style1 loop-static loop-4 cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<\/div>\n\n<div id=\"\" class=\"element acf-loop padding-top-0\"><section class=\"loop old  padding-top-0\"  >\n\t<div class=\"wrapper-out\">\n\t\t<div class=\"wrapper-in\">\n\t\t\t<div class=\"in cf\">\n\t\t\t\t<div class=\"element-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"loop-wrap loop-Publication loop-style2 loop-load_more loop-6 cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-8090\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/doi.org\/10.1007\/s11036-020-01520-8\" target=\"_blank\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Using SMS for Communication with IoT Devices<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t                                              \t\t\t\t<div class=\"authors\">Pistek, P., Hudec, M. &#8211; Mobile Networks and Applications, <span class=\"published-date\">2020<\/span><span class=\"published-year\"><\/span><\/div>\n                    \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/doi.org\/10.1007\/s00354-018-0044-4\" class=\"download-file\">Stiahnu\u0165<\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-8027\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/doi.org\/10.12700\/APH.17.5.2020.5.10\" target=\"_blank\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>The Residual Variable in Decision Diagrams<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t                                              \t\t\t\t<div class=\"excerpt\">Lucansky, J., Pistek, P., Maruniak, M. &#8211; Acta Polytechnica Hungarica, 2020,<\/div>\n                    \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/doi.org\/10.12700\/APH.17.5.2020.5.10\" class=\"download-file\">Stiahnu\u0165<\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-8071\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/doi.org\/10.4108\/eai.14-2-2017.152185\" target=\"_blank\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Multimedia System for Taxi Services with Awareness of Malicious Behavior as a Part of Smart Transportation<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t                                              \t\t\t\t<div class=\"excerpt\">Pistek, P., Polak, M. &#8211; Mobility IoT, 2018<\/div>\n                    \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-28620\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/publikacia\/automated-people-counting-in-public-transport\/\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Automated People Counting in Public Transport<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t                                              \t\t\t\t<div class=\"authors\">Pistek, P., Harvan, S., Valicek, M. &#8211; Industry 4.0 Challenges in Smart Cities, <span class=\"published-date\">21 June 2022<\/span><span class=\"published-year\"><\/span><\/div>\n                    \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-28621\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/publikacia\/fundamentals-of-cyber-and-information-security-in-slovak\/\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Fundamentals of Cyber and Information Security (in Slovak)<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t                                              \t\t\t\t<div class=\"authors\">Olejar, D., Andrasko, J., Gondova, L., Hochman, J., Hudec, L., Janacek, J., Ostertag, R., Pistek, P., Stanek, M.  &#8211; Comenius University Bratislava, <span class=\"published-date\"><\/span><span class=\"published-year\"><\/span><\/div>\n                    \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/dspace.uniba.sk\/handle\/123456789\/20?show=full\" class=\"download-file\">Stiahnu\u0165<\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/scholar.google.com\/citations?hl=sk&#038;user=4UABSvEAAAAJ\" target=\"_blank\" class=\"button purple all\">All publications: see google scholar profile<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<\/div>\n\n<div id=\"\" class=\"element core-heading\">\n<h2 class=\"wp-block-heading\" id=\"selected-student-supervising\">Selected Student Supervising<\/h2>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>He supervised more than 50 students.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-heading\">\n<h4 class=\"wp-block-heading\"><strong>Master<\/strong><\/h4>\n<\/div>\n\n<div id=\"\" class=\"element core-list\">\n<ul class=\"wp-block-list\"><div id=\"\" class=\"element core-list-item\">\n<li>Benova Lenka &#8211; Anomaly detection and classification of application servers metadata. Defended 2021<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Kaderabekova Vanessa &#8211; Data analysis in education as a support in faculty management. Defended 2021<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Lazovy Stefan &#8211; Using forensic analysis to recover non-volatile data in a fragmented environment. Defended 2021<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Vyskoc Adrian &#8211; Academic success and failure prediction using data analysis methods. Defended 2021<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Andras Radovan &#8211; Forensic analysis of network communication. Defended 2020<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Popernik Adam &#8211; Authentication of clients in cyberspace via mobile devices. Defended 2020<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Harvan Simon &#8211; Smart city: People counting in puplic transport. Defended 2019<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Baranek Tomas &#8211; Authentification based on biometrics on Android platform. Defended 2018<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Hudec Martin &#8211; Communication management in multi-client system using SMS gateway. Defended 2017<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Takacs Gabriel &#8211; Synchronization methods for IT in domain of transport. Defended 2017<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Hoskova Dominika &#8211; Information system for the Funtoro platform. Defended 2016<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Lucansky Jan &#8211; Optimalization of multiplexer trees. Defended 2015<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Polak Martin &#8211; Multimedia systems for taxi services. Defended 2015<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Maruniak Marian &#8211; Multiplexer Tree Optimization Methods. Defended 2014<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Polak Jakub &#8211; Optimalization of multiplexer trees. Defended 2012<\/li>\n<\/div><\/ul>\n<\/div>\n\n<div id=\"\" class=\"element core-heading\">\n<h4 class=\"wp-block-heading\"><strong>Bachelor<\/strong><\/h4>\n<\/div>\n\n<div id=\"\" class=\"element core-list\">\n<ul class=\"wp-block-list\"><div id=\"\" class=\"element core-list-item\">\n<li>Chmara Adam &#8211; Collecting of digital evidence in webbrowsers domain. Defended 2020<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Rajnakova Veronika Magdalena &#8211; Analysis of students data. Defended 2020<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Yanko Mykola &#8211; Forensic tools for collecting digital evidence. Defended 2020<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Lazovy Stefan &#8211; Forensic tools for collecting digital evidence. Defended 2019<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Trencansky Jan &#8211; Virtual car lock. Defended 2018<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Snopko Jakub &#8211; Analysis of the environment impact to the GPS signal. Defended 2017<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Pohancenik Matus &#8211; Sensoric system for Android platforms. Defended 2016<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Banas Martin &#8211; Information system for public transport. Defended 2015<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Pernecky Patrik &#8211; Reduction of binary decision diagrams. Defended 2015<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Lucansky Jan &#8211; Reduction of binary decision diagrams. Defended 2013<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Suty Karol &#8211; Analysis of multiplexer trees. Defended 2011<\/li>\n<\/div><\/ul>\n<\/div>","protected":false},"featured_media":0,"template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[81],"class_list":["post-5573","member","type-member","status-publish","hentry","category-data-analytics-for-green-energy-sk"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Peter Pi\u0161tek - KInIT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kinit.sk\/sk\/clen\/peter-pistek\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Peter Pi\u0161tek - KInIT\" \/>\n<meta property=\"og:description\" content=\"Peter focuses on information security, in particular forensics analysis, phishing, biometrics, network anomaly detection, and process security. He is now focusing on anomaly detection using machine learning models. Beside the...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kinit.sk\/sk\/clen\/peter-pistek\/\" \/>\n<meta property=\"og:site_name\" content=\"KInIT\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-15T15:14:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/03\/KINIT_Sharepic.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@kinit\" \/>\n<meta name=\"twitter:label1\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 min\u00faty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/clen\\\/peter-pistek\\\/\",\"url\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/clen\\\/peter-pistek\\\/\",\"name\":\"Peter Pi\u0161tek - KInIT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/#website\"},\"datePublished\":\"2021-02-14T16:41:45+00:00\",\"dateModified\":\"2025-10-15T15:14:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/clen\\\/peter-pistek\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kinit.sk\\\/sk\\\/clen\\\/peter-pistek\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/clen\\\/peter-pistek\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Analytics for Green Energy\",\"item\":\"https:\\\/\\\/kinit.sk\\\/category\\\/data-analytics-for-green-energy\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Peter Pi\u0161tek\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/#website\",\"url\":\"https:\\\/\\\/kinit.sk\\\/\",\"name\":\"KInIT\",\"description\":\"Vyu\u017e\u00edvame v\u00fdskum pre \u013eud\u00ed a priemysel\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kinit.sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Peter Pi\u0161tek - KInIT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kinit.sk\/sk\/clen\/peter-pistek\/","og_locale":"sk_SK","og_type":"article","og_title":"Peter Pi\u0161tek - KInIT","og_description":"Peter focuses on information security, in particular forensics analysis, phishing, biometrics, network anomaly detection, and process security. He is now focusing on anomaly detection using machine learning models. Beside the...","og_url":"https:\/\/kinit.sk\/sk\/clen\/peter-pistek\/","og_site_name":"KInIT","article_modified_time":"2025-10-15T15:14:56+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/03\/KINIT_Sharepic.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@kinit","twitter_misc":{"Predpokladan\u00fd \u010das \u010d\u00edtania":"3 min\u00faty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/kinit.sk\/sk\/clen\/peter-pistek\/","url":"https:\/\/kinit.sk\/sk\/clen\/peter-pistek\/","name":"Peter Pi\u0161tek - KInIT","isPartOf":{"@id":"https:\/\/kinit.sk\/#website"},"datePublished":"2021-02-14T16:41:45+00:00","dateModified":"2025-10-15T15:14:56+00:00","breadcrumb":{"@id":"https:\/\/kinit.sk\/sk\/clen\/peter-pistek\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kinit.sk\/sk\/clen\/peter-pistek\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kinit.sk\/sk\/clen\/peter-pistek\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kinit.sk\/sk\/"},{"@type":"ListItem","position":2,"name":"Data Analytics for Green Energy","item":"https:\/\/kinit.sk\/category\/data-analytics-for-green-energy\/"},{"@type":"ListItem","position":3,"name":"Peter Pi\u0161tek"}]},{"@type":"WebSite","@id":"https:\/\/kinit.sk\/#website","url":"https:\/\/kinit.sk\/","name":"KInIT","description":"Vyu\u017e\u00edvame v\u00fdskum pre \u013eud\u00ed a priemysel","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kinit.sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"}]}},"_links":{"self":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/member\/5573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/member"}],"about":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/types\/member"}],"version-history":[{"count":31,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/member\/5573\/revisions"}],"predecessor-version":[{"id":38632,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/member\/5573\/revisions\/38632"}],"wp:attachment":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/media?parent=5573"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/categories?post=5573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}